ID
VAR-E-200703-0004
CVE
cve_id: | CVE-2007-1355 | Trust: 2.4 |
cve_id: | CVE-2008-2938 | Trust: 2.3 |
cve_id: | CVE-2007-0450 | Trust: 0.8 |
cve_id: | CVE-2007-2449 | Trust: 0.8 |
cve_id: | CVE-2007-3386 | Trust: 0.5 |
cve_id: | CVE-2006-3835 | Trust: 0.5 |
cve_id: | CVE-2007-3382 | Trust: 0.3 |
cve_id: | CVE-2007-3385 | Trust: 0.3 |
cve_id: | CVE-2007-4724 | Trust: 0.3 |
cve_id: | CVE-2006-7196 | Trust: 0.3 |
EDB ID
30052
TITLE
Apache Tomcat <= 6.0.18 UTF8 Directory Traversal Vulnerability
Trust: 1.2
DESCRIPTION
Apache Tomcat 6.0.10 - Documentation Sample Application Multiple Cross-Site Scripting Vulnerabilities. CVE-2007-1355CVE-34875 . remote exploit for Multiple platform
Trust: 1.0
AFFECTED PRODUCTS
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.10 | Trust: 1.6 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 10.2 | Trust: 1.5 |
vendor: | redhat | model: | network satellite (for rhel | scope: | eq | version: | 4)4.2 | Trust: 1.5 |
vendor: | hp | model: | hp-ux b.11.31 | scope: | - | version: | - | Trust: 1.5 |
vendor: | hp | model: | hp-ux b.11.23 | scope: | - | version: | - | Trust: 1.5 |
vendor: | hp | model: | hp-ux b.11.11 | scope: | - | version: | - | Trust: 1.5 |
vendor: | computer | model: | associates cohesion application configuration manager | scope: | eq | version: | 4.5 | Trust: 1.5 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0 | Trust: 1.5 |
vendor: | computer | model: | associates cohesion application configuration manager sp1 | scope: | ne | version: | 4.5 | Trust: 1.5 |
vendor: | suse | model: | linux enterprise server sp3 | scope: | eq | version: | 9 | Trust: 1.2 |
vendor: | suse | model: | linux enterprise server sp1 | scope: | eq | version: | 10 | Trust: 1.2 |
vendor: | suse | model: | linux enterprise server | scope: | eq | version: | 10 | Trust: 1.2 |
vendor: | suse | model: | linux enterprise sdk | scope: | eq | version: | 10 | Trust: 1.2 |
vendor: | suse | model: | linux enterprise desktop sp1 | scope: | eq | version: | 10 | Trust: 1.2 |
vendor: | suse | model: | linux enterprise desktop | scope: | eq | version: | 10 | Trust: 1.2 |
vendor: | suse | model: | linux professional x86 64 | scope: | eq | version: | 10.2 | Trust: 1.2 |
vendor: | suse | model: | linux personal x86 64 | scope: | eq | version: | 10.2 | Trust: 1.2 |
vendor: | s u s e | model: | unitedlinux | scope: | eq | version: | 1.0 | Trust: 1.2 |
vendor: | s u s e | model: | suse linux standard server | scope: | eq | version: | 8.0 | Trust: 1.2 |
vendor: | s u s e | model: | suse linux school server for i386 | scope: | - | version: | - | Trust: 1.2 |
vendor: | s u s e | model: | suse linux retail solution | scope: | eq | version: | 8.0 | Trust: 1.2 |
vendor: | s u s e | model: | suse linux openexchange server | scope: | eq | version: | 4.0 | Trust: 1.2 |
vendor: | s u s e | model: | linux professional oss | scope: | eq | version: | 10.0 | Trust: 1.2 |
vendor: | s u s e | model: | linux professional | scope: | eq | version: | 10.0 | Trust: 1.2 |
vendor: | s u s e | model: | linux professional | scope: | eq | version: | 10.2 | Trust: 1.2 |
vendor: | s u s e | model: | linux professional | scope: | eq | version: | 10.1 | Trust: 1.2 |
vendor: | s u s e | model: | linux personal | scope: | eq | version: | 10.2 | Trust: 1.2 |
vendor: | s u s e | model: | linux personal | scope: | eq | version: | 10.1 | Trust: 1.2 |
vendor: | s u s e | model: | linux | scope: | eq | version: | 10.1x86-64 | Trust: 1.2 |
vendor: | s u s e | model: | linux | scope: | eq | version: | 10.1x86 | Trust: 1.2 |
vendor: | s u s e | model: | linux ppc | scope: | eq | version: | 10.1 | Trust: 1.2 |
vendor: | s u s e | model: | linux | scope: | eq | version: | 10.0x86-64 | Trust: 1.2 |
vendor: | s u s e | model: | linux | scope: | eq | version: | 10.0x86 | Trust: 1.2 |
vendor: | s u s e | model: | linux ppc | scope: | eq | version: | 10.0 | Trust: 1.2 |
vendor: | redhat | model: | enterprise linux desktop workstation client | scope: | eq | version: | 5 | Trust: 1.2 |
vendor: | red | model: | hat red hat network satellite server | scope: | eq | version: | 5.0 | Trust: 1.2 |
vendor: | red | model: | hat network satellite (for rhel | scope: | eq | version: | 3)4.2 | Trust: 1.2 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2008.0 | Trust: 1.2 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2008.0 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.15 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.14 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.13 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.12 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.11 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.10 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.9 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.8 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.7 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.6 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.5 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.4 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.3 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.2 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.1 | Trust: 1.2 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5 | Trust: 1.2 |
vendor: | suse | model: | linux enterprise server | scope: | eq | version: | 9 | Trust: 0.9 |
vendor: | suse | model: | linux enterprise server | scope: | eq | version: | 8 | Trust: 0.9 |
vendor: | suse | model: | linux enterprise sdk 10.sp1 | scope: | - | version: | - | Trust: 0.9 |
vendor: | s u s e | model: | open-enterprise-server | scope: | eq | version: | 9.0 | Trust: 0.9 |
vendor: | s u s e | model: | open-enterprise-server | scope: | eq | version: | 0 | Trust: 0.9 |
vendor: | s u s e | model: | novell linux pos | scope: | eq | version: | 9 | Trust: 0.9 |
vendor: | s u s e | model: | novell linux desktop | scope: | eq | version: | 9.0 | Trust: 0.9 |
vendor: | s u s e | model: | linux personal oss | scope: | eq | version: | 10.0 | Trust: 0.9 |
vendor: | red | model: | hat red hat network satellite server | scope: | eq | version: | 4.2 | Trust: 0.9 |
vendor: | red | model: | hat enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.9 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 5 | Trust: 0.9 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2007.1 | Trust: 0.9 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2007.1 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.1 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.22 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.21 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.20 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.19 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.18 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.17 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.16 | Trust: 0.9 |
vendor: | suse | model: | linux enterprise server sp2 | scope: | eq | version: | 10 | Trust: 0.9 |
vendor: | suse | model: | linux enterprise sdk sp1 | scope: | eq | version: | 10 | Trust: 0.9 |
vendor: | suse | model: | opensuse | scope: | eq | version: | 10.3 | Trust: 0.9 |
vendor: | s u s e | model: | suse linux open-xchange | scope: | eq | version: | 4.1 | Trust: 0.9 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 10.1 | Trust: 0.9 |
vendor: | s u s e | model: | linux desktop | scope: | eq | version: | 10 | Trust: 0.9 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.11 | Trust: 0.9 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.11 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.30 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.16 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.15 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.14 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.13 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.12 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.11 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.10 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.3 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.2 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.1 | Trust: 0.9 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.1 | Trust: 0.9 |
vendor: | sun | model: | jre 06 | scope: | eq | version: | 1.5 | Trust: 0.9 |
vendor: | sun | model: | jre 05 | scope: | eq | version: | 1.5 | Trust: 0.9 |
vendor: | sun | model: | jre 04 | scope: | eq | version: | 1.5 | Trust: 0.9 |
vendor: | sun | model: | jre 03 | scope: | eq | version: | 1.5 | Trust: 0.9 |
vendor: | sun | model: | jre 02 | scope: | eq | version: | 1.5 | Trust: 0.9 |
vendor: | sun | model: | jre 01 | scope: | eq | version: | 1.5 | Trust: 0.9 |
vendor: | sun | model: | jre | scope: | eq | version: | 1.5 | Trust: 0.9 |
vendor: | sun | model: | jre 10 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 09 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 08 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 07 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 06 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 05 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 04 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 03 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 02 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 01 | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre | scope: | eq | version: | 1.4.2 | Trust: 0.9 |
vendor: | sun | model: | jre 1.6.0 03 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.6.0 02 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.6.0 01 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.5.0 14 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.5.0 13 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.5.0 12 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.5.0 11 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.5.0 10 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 18 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 17 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 16 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 15 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 14 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 13 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 12 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 11 | scope: | - | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.6.0 11 | scope: | ne | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.5.0 17 | scope: | ne | version: | - | Trust: 0.9 |
vendor: | sun | model: | jre 1.4.2 19 | scope: | ne | version: | - | Trust: 0.9 |
vendor: | suse | model: | linux enterprise server sdk | scope: | eq | version: | 9 | Trust: 0.6 |
vendor: | sun | model: | solaris 9 x86 | scope: | - | version: | - | Trust: 0.6 |
vendor: | sun | model: | solaris 9 sparc | scope: | - | version: | - | Trust: 0.6 |
vendor: | sun | model: | solaris 10 x86 | scope: | - | version: | - | Trust: 0.6 |
vendor: | sun | model: | solaris 10 sparc | scope: | - | version: | - | Trust: 0.6 |
vendor: | s u s e | model: | linux professional x86 64 | scope: | eq | version: | 9.3 | Trust: 0.6 |
vendor: | s u s e | model: | linux professional | scope: | eq | version: | 9.3 | Trust: 0.6 |
vendor: | s u s e | model: | linux personal x86 64 | scope: | eq | version: | 9.3 | Trust: 0.6 |
vendor: | s u s e | model: | linux personal | scope: | eq | version: | 9.3 | Trust: 0.6 |
vendor: | redhat | model: | certificate server | scope: | eq | version: | 7.3 | Trust: 0.6 |
vendor: | red | model: | hat red hat network satellite server | scope: | eq | version: | 4.1 | Trust: 0.6 |
vendor: | red | model: | hat red hat network satellite server | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage job workload server | scope: | eq | version: | 8.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage business application server enterprise | scope: | eq | version: | 8.0.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition 6.0a | scope: | - | version: | - | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.10 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.10 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.9 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.8 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.7 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.6 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.5 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.4 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.3 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.2 | Trust: 0.6 |
vendor: | suse | model: | linux enterprise sp1 debuginfo | scope: | eq | version: | 10 | Trust: 0.6 |
vendor: | s u s e | model: | open-enterprise-server | scope: | eq | version: | 1 | Trust: 0.6 |
vendor: | s u s e | model: | office server | scope: | - | version: | - | Trust: 0.6 |
vendor: | s u s e | model: | novell linux desktop sdk | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | s u s e | model: | novell linux desktop | scope: | eq | version: | 1.0 | Trust: 0.6 |
vendor: | s u s e | model: | linux desktop | scope: | eq | version: | 1.0 | Trust: 0.6 |
vendor: | red | model: | hat fedora | scope: | eq | version: | 7 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.13 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.12 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.11 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0.10 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.24 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.5.23 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.28 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.19 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.9 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.8 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.7 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.6 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.5 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.0.4 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.1.36 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.1.24 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.1.12 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.1.10 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.0.6 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.0.5 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.0.4 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.0.3 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.0.2 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.0.1 | Trust: 0.6 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | redhat | model: | network satellite (for rhel | scope: | eq | version: | 4)5.1 | Trust: 0.6 |
vendor: | novell | model: | zenworks linux management | scope: | eq | version: | 7.3 | Trust: 0.6 |
vendor: | sun | model: | solaris | scope: | eq | version: | 10 | Trust: 0.6 |
vendor: | redhat | model: | red hat network satellite server | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.9 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.8 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.7 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.6 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.5 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.4 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.3 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.2 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.1 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.23 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.22 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.21 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.20 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.19 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.18 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.17 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.16 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.15 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.14 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.13 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.12 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.11 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.10 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.9 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.8 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.7 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.6 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.5 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.4 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.3 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.2 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.1 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.36 | Trust: 0.6 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1 | Trust: 0.6 |
vendor: | sun | model: | jre 1.6.0 2 | scope: | - | version: | - | Trust: 0.6 |
vendor: | sun | model: | jre 1.5.0.0 09 | scope: | - | version: | - | Trust: 0.6 |
vendor: | sun | model: | jre 1.5.0.0 08 | scope: | - | version: | - | Trust: 0.6 |
vendor: | sun | model: | jre 1.5.0.0 07 | scope: | - | version: | - | Trust: 0.6 |
vendor: | apache | model: | tomcat utf-8 | scope: | - | version: | - | Trust: 0.5 |
vendor: | oracle | model: | containers for java | scope: | - | version: | - | Trust: 0.5 |
vendor: | toutvirtual | model: | virtualiq pro | scope: | - | version: | - | Trust: 0.5 |
vendor: | vmware | model: | virtualcenter management server | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.0.2 | Trust: 0.3 |
vendor: | vmware | model: | esx server | scope: | eq | version: | 3.0.1 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux virtualization server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux optional productivity application server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hardware certification | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop multi os client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux clustering server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux cluster-storage server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux supplementary server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop supplementary client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.3 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.3.9 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 6.0.10 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 5.5.23 | Trust: 0.3 |
vendor: | s u s e | model: | linux openexchange server | scope: | - | version: | - | Trust: 0.3 |
vendor: | s u s e | model: | linux office server | scope: | - | version: | - | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for novell groupwise | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for novell groupwise | scope: | eq | version: | 4.1.7 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for novell groupwise | scope: | eq | version: | 4.1.4 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for exchange mr1 | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for exchange | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for exchange | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for exchange sp2 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for exchange | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for exchange | scope: | eq | version: | 4.1.7 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for exchange | scope: | eq | version: | 4.1.4 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for domino mr1 | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server for domino | scope: | eq | version: | 4.1.4 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server express for exchange mr1 | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server express for exchange | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server express for exchange | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server express for exchange | scope: | eq | version: | 4.1.4 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server express for domino mr1 | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server express for domino | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | research | model: | in motion blackberry enterprise server express for domino | scope: | eq | version: | 4.1.4 | Trust: 0.3 |
vendor: | redhat | model: | developer suite el4 | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | ibm | model: | tivoli access manager enterprise single sign-on | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | hp | model: | tru64 unix 5.1b-4 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | tru64 unix pk6 | scope: | eq | version: | 5.1.0 | Trust: 0.3 |
vendor: | hp | model: | tru64 unix b-4 | scope: | eq | version: | 5.1.0 | Trust: 0.3 |
vendor: | hp | model: | tru64 unix b-3 | scope: | eq | version: | 5.1.0 | Trust: 0.3 |
vendor: | hp | model: | internet express | scope: | eq | version: | 6.7 | Trust: 0.3 |
vendor: | hp | model: | internet express | scope: | eq | version: | 6.6 | Trust: 0.3 |
vendor: | hp | model: | internet express | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux mipsel | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux m68k | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux hppa | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux alpha | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | debian | model: | linux | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.9 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.8 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.7 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.6 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.5 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.4 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.9 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.8 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.7 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.6 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.1 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.1.34 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 3.3.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat a | scope: | eq | version: | 3.3.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 3.3.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 3.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 6.0.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | eq | version: | 4.1.31 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat beta | scope: | eq | version: | 4.1.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat rc2 | scope: | eq | version: | 4.0.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 5.5.16 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 5.0.31 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 4.1.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 4.0.7 | Trust: 0.3 |
vendor: | s u s e | model: | linux professional x86 64 | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | s u s e | model: | linux professional | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | s u s e | model: | linux personal x86 64 | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | s u s e | model: | linux personal | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | s u s e | model: | linux personal x86 64 | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | s u s e | model: | linux personal | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | s u s e | model: | linux personal x86 64 | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation tomcat | scope: | ne | version: | 4.1.37 | Trust: 0.3 |
vendor: | sun | model: | solaris | scope: | eq | version: | 9 | Trust: 0.3 |
vendor: | redhat | model: | network satellite (for rhel | scope: | eq | version: | 3)4.2 | Trust: 0.3 |
vendor: | redhat | model: | fedora | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.4 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.30 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.16 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.15 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.14 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.13 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.12 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.11 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.10 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.9 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.8 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.7 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.6 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.5 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.4 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.2 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.0.6 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.0.5 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.0.4 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.0.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.0.2 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.0.1 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 6.0.11 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 4.1.37 | Trust: 0.3 |
vendor: | wikid | model: | systems wikid server | scope: | eq | version: | 3.0.4 | Trust: 0.3 |
vendor: | sun | model: | jre 07 | scope: | eq | version: | 1.5 | Trust: 0.3 |
vendor: | sun | model: | jre beta | scope: | eq | version: | 1.5.0 | Trust: 0.3 |
vendor: | sun | model: | jre 10-b03 | scope: | eq | version: | 1.4.2 | Trust: 0.3 |
vendor: | sun | model: | jre 1.5.0 09 | scope: | - | version: | - | Trust: 0.3 |
vendor: | sun | model: | jre 1.5.0 08 | scope: | - | version: | - | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | s u s e | model: | opensuse | scope: | eq | version: | 10.3 | Trust: 0.3 |
vendor: | redhat | model: | red hat network satellite server | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | redhat | model: | red hat network satellite (for rhel | scope: | eq | version: | 4)5.1 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform el5 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform el4 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform .cp03 | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | developer suite as4 | scope: | eq | version: | 3 | Trust: 0.3 |
vendor: | redhat | model: | application server ws4 | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | redhat | model: | application server es4 | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | redhat | model: | application server as4 | scope: | eq | version: | 2 | Trust: 0.3 |
vendor: | oracle | model: | oracle10g application server | scope: | eq | version: | 10.1.3.1.0 | Trust: 0.3 |
vendor: | openjdk | model: | java | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2008.1 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2008.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition b | scope: | eq | version: | 9.1.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition b | scope: | eq | version: | 9.1.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition 9.1.0b | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition 9.1.0b | scope: | - | version: | - | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange enterprise edition | scope: | eq | version: | - | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0.0.52 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.6 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.5 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.4 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.3 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.5.5 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.16 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.15 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.14 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.13 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.12 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0.11 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.26 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.25 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 5.5.24 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.37 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.34 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.32 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.31 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.30 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.29 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.28 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.24 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.12 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.10 | Trust: 0.3 |
vendor: | apache | model: | tomcat beta | scope: | eq | version: | 4.1.9 | Trust: 0.3 |
vendor: | apache | model: | tomcat beta | scope: | eq | version: | 4.1.3 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | eq | version: | 4.1.3 | Trust: 0.3 |
vendor: | apache | model: | harmony m8 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | apache | model: | harmony m7 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | wikid | model: | systems wikid server | scope: | ne | version: | 3.0.5 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise application platform .cp04 | scope: | ne | version: | 4.2 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 6.0.18 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 5.5.27 | Trust: 0.3 |
vendor: | apache | model: | tomcat | scope: | ne | version: | 4.1.39 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/24058/info
Apache Tomcat's documentation web application includes a sample application that is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
The following Tomcat versions are affected:
4.0.0 to 4.0.6
4.1.0 to 4.1.36
5.0.0 to 5.0.30
5.5.0 to 5.5.23
6.0.0 to 6.0.10
http://www.example.com/tomcat-docs/appdev/sample/web/hello.jsp?test=<script>alert(document.domain)</script>
Trust: 1.0
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
EXPLOIT LANGUAGE
txt
Trust: 1.0
PRICE
Free
Trust: 9.8
TYPE
Input Validation Error
Trust: 1.8
TAGS
tag: | exploit | Trust: 4.0 |
tag: | xss | Trust: 2.0 |
tag: | file inclusion | Trust: 1.5 |
tag: | web | Trust: 1.0 |
tag: | vulnerability | Trust: 1.0 |
tag: | java | Trust: 0.5 |
tag: | code execution | Trust: 0.5 |
tag: | csrf | Trust: 0.5 |
CREDITS
Mark Thomas
Trust: 1.0
EXTERNAL IDS
db: | NVD | id: | CVE-2008-2938 | Trust: 4.1 |
db: | NVD | id: | CVE-2007-1355 | Trust: 3.0 |
db: | EXPLOIT-DB | id: | 30052 | Trust: 1.9 |
db: | BID | id: | 24058 | Trust: 1.9 |
db: | NVD | id: | CVE-2007-0450 | Trust: 1.4 |
db: | NVD | id: | CVE-2007-2449 | Trust: 1.4 |
db: | NVD | id: | CVE-2007-3386 | Trust: 1.1 |
db: | NVD | id: | CVE-2006-3835 | Trust: 1.1 |
db: | NVD | id: | CVE-2007-3382 | Trust: 0.9 |
db: | NVD | id: | CVE-2007-3385 | Trust: 0.9 |
db: | NVD | id: | CVE-2006-7196 | Trust: 0.9 |
db: | EDBNET | id: | 70551 | Trust: 0.6 |
db: | EDBNET | id: | 69694 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 9239 | Trust: 0.6 |
db: | EDBNET | id: | 9239 | Trust: 0.6 |
db: | NVD | id: | CVE-2007-1358 | Trust: 0.6 |
db: | NVD | id: | CVE-2007-1858 | Trust: 0.6 |
db: | NVD | id: | CVE-2008-0128 | Trust: 0.6 |
db: | NVD | id: | CVE-2005-3510 | Trust: 0.6 |
db: | NVD | id: | CVE-2006-7195 | Trust: 0.6 |
db: | NVD | id: | CVE-2007-2450 | Trust: 0.6 |
db: | NVD | id: | CVE-2005-2090 | Trust: 0.6 |
db: | EDBNET | id: | 69665 | Trust: 0.6 |
db: | EDBNET | id: | 51779 | Trust: 0.6 |
db: | PACKETSTORM | id: | 69010 | Trust: 0.5 |
db: | PACKETSTORM | id: | 92240 | Trust: 0.5 |
db: | PACKETSTORM | id: | 57183 | Trust: 0.5 |
db: | PACKETSTORM | id: | 56883 | Trust: 0.5 |
db: | PACKETSTORM | id: | 55163 | Trust: 0.5 |
db: | PACKETSTORM | id: | 58554 | Trust: 0.5 |
db: | PACKETSTORM | id: | 74165 | Trust: 0.5 |
db: | PACKETSTORM | id: | 82649 | Trust: 0.5 |
db: | BID | id: | 22960 | Trust: 0.3 |
db: | BID | id: | 25316 | Trust: 0.3 |
db: | NVD | id: | CVE-2007-4724 | Trust: 0.3 |
db: | BID | id: | 25531 | Trust: 0.3 |
db: | BID | id: | 24476 | Trust: 0.3 |
db: | CERT/CC | id: | VU#343355 | Trust: 0.3 |
db: | BID | id: | 30633 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2007-1355 | Trust: 2.1 |
url: | https://nvd.nist.gov/vuln/detail/cve-2008-2938 | Trust: 2.0 |
url: | https://www.intelligentexploit.com | Trust: 1.8 |
url: | https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentid=197540 | Trust: 1.5 |
url: | http://tomcat.apache.org/ | Trust: 1.5 |
url: | http://rhn.redhat.com/errata/rhsa-2008-0261.html | Trust: 1.5 |
url: | http://rhn.redhat.com/errata/rhsa-2008-0524.html | Trust: 1.5 |
url: | https://www.securityfocus.com/bid/24058/info | Trust: 1.0 |
url: | http://support.apple.com/kb/ht2163 | Trust: 0.9 |
url: | http://rhn.redhat.com/errata/rhsa-2007-1069.html | Trust: 0.6 |
url: | http://sunsolve.sun.com/search/document.do?assetkey=1-66-239312-1 | Trust: 0.6 |
url: | http://tomcat.apache.org/security-6.html | Trust: 0.6 |
url: | http://download.novell.com/download?buildid=n5vszfht1vs | Trust: 0.6 |
url: | http://www.novell.com/support/viewcontent.do?externalid=7006398 | Trust: 0.6 |
url: | https://0day.today/exploits/9239 | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/30052/ | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2007-2449 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2007-0450 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2007-3386 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2006-3835 | Trust: 0.5 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-200702e.html | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2007-0327.html | Trust: 0.3 |
url: | http://support.avaya.com/elmodocs2/security/asa-2007-206.htm | Trust: 0.3 |
url: | https://rhn.redhat.com/errata/rhsa-2007-0871.html | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2008-0195.html | Trust: 0.3 |
url: | http://www.blackberry.com/btsc/dynamickc.do?externalid=kb25966&sliceid=1&command=show&forward=nonthreadedkc&kcid=kb25966 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg1iz55562 | Trust: 0.3 |
url: | http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23/ca20090123-01-cohesion-tomcat-multiple-vulnerabilities.aspx | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2007-0569.html | Trust: 0.3 |
url: | http://www.dragoslungu.com/2007/06/07/bbpress-xss-vulnerability/ | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2008-0630.html | Trust: 0.3 |
url: | http://bbpress.org/ | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2008-0627.html | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/30052 | Trust: 0.3 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-201003e.html | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/343355 | Trust: 0.3 |
url: | https://sourceforge.net/project/shownotes.php?release_id=626903&group_id=144774 | Trust: 0.3 |
url: | http://rhn.redhat.com/errata/rhsa-2008-0648.html | Trust: 0.3 |
url: | http://www.redhat.com/docs/en-us/jboss_enterprise_application_platform/4.2.0.cp04/html-single/readme/index.html | Trust: 0.3 |
url: | http://harmony.apache.org/ | Trust: 0.3 |
url: | http://openjdk.java.net/ | Trust: 0.3 |
url: | http://java.sun.com/javase/6/webnotes/6u11.html | Trust: 0.3 |
url: | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_oracle_java1 | Trust: 0.3 |
url: | http://support.avaya.com/elmodocs2/security/asa-2008-401.htm | Trust: 0.3 |
url: | https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_oracle_java | Trust: 0.3 |
SOURCES
db: | BID | id: | 22960 |
db: | BID | id: | 25316 |
db: | BID | id: | 25531 |
db: | BID | id: | 24476 |
db: | BID | id: | 24058 |
db: | BID | id: | 30633 |
db: | PACKETSTORM | id: | 69010 |
db: | PACKETSTORM | id: | 92240 |
db: | PACKETSTORM | id: | 57183 |
db: | PACKETSTORM | id: | 56883 |
db: | PACKETSTORM | id: | 55163 |
db: | PACKETSTORM | id: | 58554 |
db: | PACKETSTORM | id: | 74165 |
db: | PACKETSTORM | id: | 82649 |
db: | EXPLOIT-DB | id: | 30052 |
db: | EDBNET | id: | 70551 |
db: | EDBNET | id: | 69694 |
db: | EDBNET | id: | 9239 |
db: | EDBNET | id: | 69665 |
db: | EDBNET | id: | 51779 |
LAST UPDATE DATE
2022-06-21T13:52:36.823000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 22960 | date: | 2010-08-05T20:45:00 |
db: | BID | id: | 25316 | date: | 2015-03-19T09:17:00 |
db: | BID | id: | 25531 | date: | 2015-03-19T09:14:00 |
db: | BID | id: | 24476 | date: | 2015-03-19T08:19:00 |
db: | BID | id: | 24058 | date: | 2009-01-28T00:19:00 |
db: | BID | id: | 30633 | date: | 2015-04-13T22:13:00 |
SOURCES RELEASE DATE
db: | BID | id: | 22960 | date: | 2007-03-14T00:00:00 |
db: | BID | id: | 25316 | date: | 2007-08-14T00:00:00 |
db: | BID | id: | 25531 | date: | 2007-09-04T00:00:00 |
db: | BID | id: | 24476 | date: | 2007-06-14T00:00:00 |
db: | BID | id: | 24058 | date: | 2007-05-19T00:00:00 |
db: | BID | id: | 30633 | date: | 2008-08-11T00:00:00 |
db: | PACKETSTORM | id: | 69010 | date: | 2008-08-13T03:03:16 |
db: | PACKETSTORM | id: | 92240 | date: | 2010-07-28T17:52:44 |
db: | PACKETSTORM | id: | 57183 | date: | 2007-06-15T02:59:09 |
db: | PACKETSTORM | id: | 56883 | date: | 2007-05-22T01:45:13 |
db: | PACKETSTORM | id: | 55163 | date: | 2007-03-20T03:26:18 |
db: | PACKETSTORM | id: | 58554 | date: | 2007-08-14T17:52:16 |
db: | PACKETSTORM | id: | 74165 | date: | 2009-01-21T02:10:01 |
db: | PACKETSTORM | id: | 82649 | date: | 2009-11-17T00:59:14 |
db: | EXPLOIT-DB | id: | 30052 | date: | 2007-05-19T00:00:00 |
db: | EDBNET | id: | 70551 | date: | 2008-08-17T00:00:00 |
db: | EDBNET | id: | 69694 | date: | 2009-01-26T00:00:00 |
db: | EDBNET | id: | 9239 | date: | 2008-08-11T00:00:00 |
db: | EDBNET | id: | 69665 | date: | 2009-01-27T00:00:00 |
db: | EDBNET | id: | 51779 | date: | 2007-05-19T00:00:00 |